Derek Atkins wrote:
>
> If you allow any real-time protocol through your firewall, someone can
> tunnel through it. It's a fact of life. If you allow telnet, ssh,
> http, even nntp or smtp, it can be used to tunnel another protocol.
> If you want to disable tunneling, unplug yourself from the 'net. If
> that isn't an option, then you're going to have to use social means to
> prevent people from doing it.
Or stateful inspection tools. Which is what I was asking about.
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************